Wireless-G Router WGR614v9 Reference Manual
Safeguarding Your Network
2-7
v1.1, May 2008
•
Channel
. This field determines which operating frequency is used. It should not be necessary
to change the wireless channel unless you notice interference problems with another nearby
wireless network. The wireless router uses channel bonding technology to extend the
bandwidth for data transmission. For more information about the wireless channel
frequencies, see the online document that you can access from
“Wireless Networking Basics”
in Appendix B
.
•
Mode
. This field determines which data communications protocol is used. You can choose
from: b and g; or g only.
•
Security Options
. The selection of wireless security options can significantly affect your
network performance. The time it takes to establish a wireless connection can vary depending
on both your security settings and router placement.
WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2-
PSK encryption can consume more battery power on a notebook computer, and can cause
significant performance degradation with a slow computer. Instructions for configuring the
security options can be found in
“Choosing Appropriate Wireless Security” on page 2-1
. A full
explanation of wireless security standards is available in the online document that you can
access from
“Wireless Networking Basics” in Appendix B
.
3.
Click
Apply
to save your settings.
Configuring WEP Wireless Security
WEP Shared Key authentication and WEP data encryption can be defeated by a determined
eavesdropper using publicly available tools.
WEP offers the following options:
•
Open System
. With Open System authentication and 64 or 128 bit WEP data encryption, the
Wireless-G Router
does
perform data encryption but
does not
perform any authentication.
Anyone can join the network. This setting provides very little practical wireless security.
•
Shared Key
. With Shared Key authentication, a wireless device must know the WEP key to
join the network. Select the encryption strength (64 or 128 bit data encryption). Manually
enter the key values, or enter a word or group of printable characters in the
Passphrase
field.
Manually entered keys
are not
case-sensitive, but passphrase characters
are
case-sensitive.